The product uses a default cryptographic key for potentially critical functionality.
It is common practice for products to be designed to use default keys. The rationale is to simplify the manufacturing process or the system administrator's task of installation and deployment into an enterprise. However, if admins do not change the defaults, it is easier for attackers to bypass authentication quickly across multiple organizations.
Threat Mapped score: 0.0
Industry: Finiancial
Threat priority: Unclassified
CVE: CVE-2018-3825
cloud cluster management product has a default master encryption key
CVE: CVE-2016-1561
backup storage product has a default SSH public key in the authorized_keys file, allowing root access
CVE: CVE-2010-2306
Intrusion Detection System (IDS) uses the same static, private SSL keys for multiple devices and installations, allowing decryption of SSL traffic
N/A
N/A
Phase | Note |
---|---|
Architecture and Design | N/A |
N/A